Search results for " computing"

showing 10 items of 2075 documents

Ensuring the Reliability of an Autonomous Vehicle

2017

International audience; In automotive applications, several components, offering different services, can be composed in order to handle one specific task (autonomous driving for example). Nevertheless, component composition is not straightforward and is subject to the occurrence ofbugs resulting from components or services incompatibilities for instance. Hence, bugs detection in component-based systems at thedesign level is very important, particularly, when the developed system concerns automotive applications supporting critical services.In this paper, we propose a formal approach for modeling and verifying the reliability of an autonomous vehicle system, communicatingcontinuously with of…

021110 strategic defence & security studiesFocus (computing)021103 operations researchComputer sciencebusiness.industryDistributed computingReliability (computer networking)0211 other engineering and technologiesAutomotive industry[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationTask (project management)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Systems Modeling LanguageComponent (UML)Systems architectureTime constraint[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessProceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Automatic Integration of Spatial Data into the Semantic Web

2017

International audience

021110 strategic defence & security studies[ INFO ] Computer Science [cs]Information retrieval[INFO.INFO-WB] Computer Science [cs]/Webbusiness.industryComputer scienceOntology-based data integration05 social sciences[INFO.INFO-WB]Computer Science [cs]/Web[ INFO.INFO-WB ] Computer Science [cs]/Web0211 other engineering and technologies050801 communication & media studies02 engineering and technology[INFO] Computer Science [cs]Social Semantic Web0508 media and communicationsSemantic computingSemantic analyticsSemantic integration[INFO]Computer Science [cs]Semantic Web StackbusinessSemantic WebData WebComputingMilieux_MISCELLANEOUS
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct

Deduplication Potential of HPC Applications’ Checkpoints

2016

HPC systems contain an increasing number of components, decreasing the mean time between failures. Checkpoint mechanisms help to overcome such failures for long-running applications. A viable solution to remove the resulting pressure from the I/O backends is to deduplicate the checkpoints. However, there is little knowledge about the potential to save I/Os for HPC applications by using deduplication within the checkpointing process. In this paper, we perform a broad study about the deduplication behavior of HPC application checkpointing and its impact on system design.

0301 basic medicine03 medical and health sciences030104 developmental biologyComputer scienceDistributed computingScalabilityData_FILESRedundancy (engineering)Data deduplicationApplication checkpointing2016 IEEE International Conference on Cluster Computing (CLUSTER)
researchProduct

Combining GPU and FPGA technology for efficient exhaustive interaction analysis in GWAS

2016

Interaction between genes has become a major topic in quantitative genetics. It is believed that these interactions play a significant role in genetic variations causing complex diseases. Due to the number of tests required for an exhaustive search in genome-wide association studies (GWAS), a large amount of computational power is required. In this paper, we present a hybrid architecture consisting of tightly interconnected CPUs, GPUs and FPGAs and a fine-tuned software suite to outperform other implementations in pairwise interaction analysis while consuming less than 300Watts and fitting into a standard desktop computer case.

0301 basic medicine03 medical and health sciences030104 developmental biologySoftware suiteComputer architecturePairwise interactionComputer scienceBrute-force searchGenome-wide association studyParallel computingComputer caseField-programmable gate arrayImplementation2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP)
researchProduct

SPECTR

2018

Modern high throughput sequencing platforms can produce large amounts of short read DNA data at low cost. Error correction is an important but time-consuming initial step when processing this data in order to improve the quality of downstream analyses. In this paper, we present a Scalable Parallel Error CorrecToR designed to improve the throughput of DNA error correction for Illumina reads on various parallel platforms. Our design is based on a k-spectrum approach where a Bloom filter is frequently probed as a key operation and is optimized towards AVX-512-based multi-core CPUs, Xeon Phi many-cores (both KNC and KNL), and heterogeneous compute clusters. A number of architecture-specific opt…

0301 basic medicine03 medical and health sciencesMulti-core processor030104 developmental biologySpeedupXeonComputer scienceData structure alignmentParallel computingError detection and correctionSupercomputerThroughput (business)Xeon PhiProceedings of the 47th International Conference on Parallel Processing
researchProduct

HPG pore: an efficient and scalable framework for nanopore sequencing data.

2016

The use of nanopore technologies is expected to spread in the future because they are portable and can sequence long fragments of DNA molecules without prior amplification. The first nanopore sequencer available, the MinION™ from Oxford Nanopore Technologies, is a USB-connected, portable device that allows real-time DNA analysis. In addition, other new instruments are expected to be released soon, which promise to outperform the current short-read technologies in terms of throughput. Despite the flood of data expected from this technology, the data analysis solutions currently available are only designed to manage small projects and are not scalable. Here we present HPG Pore, a toolkit for …

0301 basic medicineComputer scienceApplied MathematicsDistributed computingDNASequence Analysis DNAData scienceBiochemistryComputer Science Applications03 medical and health scienceschemistry.chemical_compoundNanoporeNanopores030104 developmental biology0302 clinical medicinechemistryStructural Biology030220 oncology & carcinogenesisScalabilityNanopore sequencingDNA microarrayThroughput (business)Molecular BiologyDNASoftwareBMC bioinformatics
researchProduct